如何让这个程序在网络验证是否是当前的最新版
程序更新时是重新验证程序是否有改变或者是低版本然后自动更新到最新版
如果程序是修改的依然会被更新到最新版本
我要解决的和我提的问题就是
让当前最新版修改后的程序在验证当前是否是最新版时 是最新的 让程序不用去自动更新
但当又出了新版本的又能自动更新
但当又重新出了新版本后又让他自动更新
也就是如何让2.0修改的和2.0的 在网络验证更新时是一样的 不用更新
3.0出来后 2.0的修改版能更新到3.0
3.0修改的和3.0的一样 在网络验证更新时是一样的 不用更新
4.0出来后 3.0的修改的能更新4.0
.......
........
我知道只要把2.0修改版的程序里的那些文件大小,文件名称等在OD里修改成2.0的一样 在网络更新时就不用更新但我不知道改哪里怎么改
http://update.itcount.com/Update_JunQi/JunQi.asp
http://update.itcount.com/update_junqi/upgrade.txt
[SYS]
Version = 2.0.0
FileCount = 1
TotalFileSize = 354320
AppExeFile = QQ四国大战.exe
CheckSum = 4ED4FF9FD5FF5CBBA99D68F1BB0CE96F
CheckSize = 354320
URLMyAD = http://www.wanqq.net/ad/AD.html
URLOnExit =
Message = #请务必确认自己电脑中的“QQ四国军旗”游戏为最新版本!##版本号应为:四国军旗角色版 2.0 Beta04 Build031#
[File1]
URL = http://update.itcount.com/update_JunQi/JQ200.exe
Name = QQ四国大战.exe
Size = 354320
CRC32 = -1750647484
004B7BC0 . 8D85 84FDFFFF LEA EAX,DWORD PTR SS:[EBP-27C]
004B7BC6 . BA 90824B00 MOV EDX,复件_QQ?004B8290 ; file
004B7BCB . E8 14D2F4FF CALL 复件_QQ?00404DE4
004B7BD0 . 8B95 84FDFFFF MOV EDX,DWORD PTR SS:[EBP-27C]
004B7BD6 . B9 FC7F4B00 MOV ECX,复件_QQ?004B7FFC ; url
004B7BDB . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004B7BDE . 8B38 MOV EDI,DWORD PTR DS:[EAX]
004B7BE0 . FF17 CALL DWORD PTR DS:[EDI]
004B7BE2 . 8B95 88FDFFFF MOV EDX,DWORD PTR SS:[EBP-278]
004B7BE8 . 8B5D E8 MOV EBX,DWORD PTR SS:[EBP-18]
004B7BEB . 03DB ADD EBX,EBX
004B7BED . A1 DC754C00 MOV EAX,DWORD PTR DS:[4C75DC]
004B7BF2 . 8D44D8 F0 LEA EAX,DWORD PTR DS:[EAX+EBX*8-10]
004B7BF6 . E8 39CFF4FF CALL 复件_QQ?00404B34
004B7BFB . 6A 00 PUSH 0
004B7BFD . 8D85 7CFDFFFF LEA EAX,DWORD PTR SS:[EBP-284]
004B7C03 . 50 PUSH EAX
004B7C04 . 8D95 74FDFFFF LEA EDX,DWORD PTR SS:[EBP-28C]
004B7C0A . 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
004B7C0D . E8 B61AF5FF CALL 复件_QQ?004096C8
004B7C12 . 8B8D 74FDFFFF MOV ECX,DWORD PTR SS:[EBP-28C]
004B7C18 . 8D85 78FDFFFF LEA EAX,DWORD PTR SS:[EBP-288]
004B7C1E . BA 90824B00 MOV EDX,复件_QQ?004B8290 ; file
004B7C23 . E8 BCD1F4FF CALL 复件_QQ?00404DE4
004B7C28 . 8B95 78FDFFFF MOV EDX,DWORD PTR SS:[EBP-288]
004B7C2E . B9 A0824B00 MOV ECX,复件_QQ?004B82A0 ; name
004B7C33 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004B7C36 . 8B38 MOV EDI,DWORD PTR DS:[EAX]
004B7C38 . FF17 CALL DWORD PTR DS:[EDI]
004B7C3A . 8B95 7CFDFFFF MOV EDX,DWORD PTR SS:[EBP-284]
004B7C40 . A1 DC754C00 MOV EAX,DWORD PTR DS:[4C75DC]
004B7C45 . 8D44D8 F4 LEA EAX,DWORD PTR DS:[EAX+EBX*8-C]
004B7C49 . E8 E6CEF4FF CALL 复件_QQ?00404B34
004B7C4E . 6A 00 PUSH 0
004B7C50 . 8D95 6CFDFFFF LEA EDX,DWORD PTR SS:[EBP-294]
004B7C56 . 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
004B7C59 . E8 6A1AF5FF CALL 复件_QQ?004096C8
004B7C5E . 8B8D 6CFDFFFF MOV ECX,DWORD PTR SS:[EBP-294]
004B7C64 . 8D85 70FDFFFF LEA EAX,DWORD PTR SS:[EBP-290]
004B7C6A . BA 90824B00 MOV EDX,复件_QQ?004B8290 ; file
004B7C6F . E8 70D1F4FF CALL 复件_QQ?00404DE4
004B7C74 . 8B95 70FDFFFF MOV EDX,DWORD PTR SS:[EBP-290]
004B7C7A . B9 B0824B00 MOV ECX,复件_QQ?004B82B0 ; crc32
004B7C7F . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004B7C82 . 8B38 MOV EDI,DWORD PTR DS:[EAX]
004B7C84 . FF57 08 CALL DWORD PTR DS:[EDI+8]
004B7C87 . 8B15 DC754C00 MOV EDX,DWORD PTR DS:[4C75DC]
004B7C8D . 8944DA F8 MOV DWORD PTR DS:[EDX+EBX*8-8],EAX
004B7C91 . 6A 00 PUSH 0
004B7C93 . 8D95 64FDFFFF LEA EDX,DWORD PTR SS:[EBP-29C]
004B7C99 . 8B45 E8 MOV EAX,DWORD PTR SS:[EBP-18]
004B7C9C . E8 271AF5FF CALL 复件_QQ?004096C8
004B7CA1 . 8B8D 64FDFFFF MOV ECX,DWORD PTR SS:[EBP-29C]
004B7CA7 . 8D85 68FDFFFF LEA EAX,DWORD PTR SS:[EBP-298]
004B7CAD . BA 90824B00 MOV EDX,复件_QQ?004B8290 ; file
004B7CB2 . E8 2DD1F4FF CALL 复件_QQ?00404DE4
004B7CB7 . 8B95 68FDFFFF MOV EDX,DWORD PTR SS:[EBP-298]
004B7CBD . B9 C0824B00 MOV ECX,复件_QQ?004B82C0 ; size
004B7CC2 . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004B7CC5 . 8B38 MOV EDI,DWORD PTR DS:[EAX]
004B7CC7 . FF57 08 CALL DWORD PTR DS:[EDI+8]
004B7CCA . 8B15 DC754C00 MOV EDX,DWORD PTR DS:[4C75DC]
004B7CD0 . 8944DA FC MOV DWORD PTR DS:[EDX+EBX*8-4],EAX
004B7CD4 . FF45 E8 INC DWORD PTR SS:[EBP-18]
004B7CD7 . 4E DEC ESI
004B7CD8 .^ 0F85 C5FEFFFF JNZ 复件_QQ?004B7BA3
004B7CDE > 33C0 XOR EAX,EAX
004B7CE0 . 55 PUSH EBP
004B7CE1 . 68 FE7C4B00 PUSH 复件_QQ?004B7CFE
004B7CE6 . 64:FF30 PUSH DWORD PTR FS:[EAX]
004B7CE9 . 64:8920 MOV DWORD PTR FS:[EAX],ESP
004B7CEC . 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]
004B7CEF . E8 1CBFF4FF CALL 复件_QQ?00403C10
004B7CF4 . 33C0 XOR EAX,EAX
004B7CF6 . 5A POP EDX
004B7CF7 . 59 POP ECX
004B7CF8 . 59 POP ECX
004B7CF9 . 64:8910 MOV DWORD PTR FS:[EAX],EDX
004B7CFC . EB 0A JMP SHORT 复件_QQ?004B7D08
004B7CFE .^ E9 EDC3F4FF JMP 复件_QQ?004040F0
004B7D03 . E8 14C8F4FF CALL 复件_QQ?0040451C
004B7D08 > 33C0 XOR EAX,EAX
004B7D0A . 55 PUSH EBP
004B7D0B . 68 577D4B00 PUSH 复件_QQ?004B7D57
004B7D10 . 64:FF30 PUSH DWORD PTR FS:[EAX]
004B7D13 . 64:8920 MOV DWORD PTR FS:[EAX],ESP
004B7D16 . 8B15 A8754C00 MOV EDX,DWORD PTR DS:[4C75A8]
004B7D1C . 8D85 84FEFFFF LEA EAX,DWORD PTR SS:[EBP-17C]
004B7D22 . E8 9DB1F4FF CALL 复件_QQ?00402EC4
004B7D27 . BA 01000000 MOV EDX,1
004B7D2C . 8D85 84FEFFFF LEA EAX,DWORD PTR SS:[EBP-17C]
004B7D32 . E8 65B7F4FF CALL 复件_QQ?0040349C
004B7D37 . 8D85 84FEFFFF LEA EAX,DWORD PTR SS:[EBP-17C]
004B7D3D . E8 26B3F4FF CALL 复件_QQ?00403068
004B7D42 . 8D85 84FEFFFF LEA EAX,DWORD PTR SS:[EBP-17C]
004B7D48 . E8 DBB4F4FF CALL 复件_QQ?00403228
004B7D4D . 33C0 XOR EAX,EAX
004B7D4F . 5A POP EDX
004B7D50 . 59 POP ECX
004B7D51 . 59 POP ECX
004B7D52 . 64:8910 MOV DWORD PTR FS:[EAX],EDX
004B7D55 . EB 0A JMP SHORT 复件_QQ?004B7D61
004B7D57 .^ E9 94C3F4FF JMP 复件_QQ?004040F0
004B7D5C . E8 BBC7F4FF CALL 复件_QQ?0040451C
004B7D61 > 837D DC 00 CMP DWORD PTR SS:[EBP-24],0
004B7D65 . 0F84 3D010000 JE 复件_QQ?004B7EA8
004B7D6B . A1 A0CF4B00 MOV EAX,DWORD PTR DS:[4BCFA0]
004B7D70 . 8B00 MOV EAX,DWORD PTR DS:[EAX]
004B7D72 . 3B45 EC CMP EAX,DWORD PTR SS:[EBP-14]
004B7D75 . 75 11 JNZ SHORT 复件_QQ?004B7D88
004B7D77 . A1 ECCE4B00 MOV EAX,DWORD PTR DS:[4BCEEC]
004B7D7C . 8B00 MOV EAX,DWORD PTR DS:[EAX]
004B7D7E . 8B55 D8 MOV EDX,DWORD PTR SS:[EBP-28]
004B7D81 . E8 56D1F4FF CALL 复件_QQ?00404EDC
004B7D86 . 74 15 JE SHORT 复件_QQ?004B7D9D
004B7D88 > 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004B7D8B . 8B80 2C020000 MOV EAX,DWORD PTR DS:[EAX+22C]
004B7D91 . B2 01 MOV DL,1
004B7D93 . E8 F0F5F7FF CALL 复件_QQ?00437388
004B7D98 . E9 0B010000 JMP 复件_QQ?004B7EA8
004B7D9D > 8B45 F0 MOV EAX,DWORD PTR SS:[EBP-10]
004B7DA0 . BA 487F4B00 MOV EDX,复件_QQ?004B7F48 ; 2.0.0
004B7DA5 . E8 32D1F4FF CALL 复件_QQ?00404EDC
004B7DAA . 74 15 JE SHORT 复件_QQ?004B7DC1
004B7DAC . 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004B7DAF . 8B80 2C020000 MOV EAX,DWORD PTR DS:[EAX+22C]
004B7DB5 . B2 01 MOV DL,1
004B7DB7 . E8 CCF5F7FF CALL 复件_QQ?00437388
004B7DBC . E9 E7000000 JMP 复件_QQ?004B7EA8
004B7DC1 > 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
004B7DC4 . 8B80 24020000 MOV EAX,DWORD PTR DS:[EAX+224]
OD里的这些赋值比较过程 是否到跟到CALL里面 我不是很会 无从下手
ASPack 2.12 -> Alexey Solodovnikov [Overlay] 用脱壳机轻易的脱壳
0047081D /75 12 JNZ SHORT QQ四国大.00470831 修改JNZ为JN去自效验
下载地址http://wanqq.net/download/QQ四国大战(绿色版).rar
或者http://update.itcount.com/update_JunQi/JQ200.exe
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课